This year, FIC visitors have the opportunity to participate to OFF events organized by our partners on their stands. Animations, demonstrations as well as cocktails and random draw will take place throughout the event.

For this 10th edition of the FIC, a second TV studio will be hosted by Acteurs Publics, a specialized media dedicated to public policy analysis. FIC partners can participate in the «Voices to Experts » program.

In the context of the preparation of the upcoming 10th edition of the International Cybersecurity Forum (23-24 January 2018, Lille), CEIS organizes in Brussels a breakfast debate gathering high-level policy-experts in the field of Cybersecurity including MEP Pilar del Castillo, Mr. Hannes Krause, Counselor for Cybersecurity issues at the Estonian Permanent Representation to the EU, a representative from DG CONNECT (TBC), Rasmus Theede, Policy Director at Digital Europe and Jean-Pierre Quémard, Chair of CEN-CENELEC Focus Group on Cybersecurity.
This event will aim at stocktaking the key EU initiatives in the field of Cybersecurity – the new agency mentioned by President Juncker, the potential impact of GDPR in terms of security – and to assess to which extent they can contribute to increase EU resilience to cyberattacks and / or failures.

New : FIC Challenges rewards will be given right after the trials. Organized by ACISSI and EPITA, sponsored by EC-Council, ENI and Continental, FIC Challenges will take place on Tuesday 24th and Wednesday 25th of January, starting at 4PM. For this edition, each Challenge welcomes 140 contenders.

40 SMEs applied to the Innovative SME Award 2017 sponsored by Airbus Defence & Space. Our jury is currently assessing them in order to select 12 candidates who will be auditioned on the 18th and 25th of November. Good luck to all !

The next Thematic Breakfast will take place on Thursday 15th September on the theme « Incident Response: how far can automatisation go ? ».
Automising incident response appears like a promising solution to face the increase in security events. It is no longer only about detecting and correlating events, but to prevent, detect and respond to attacks in a simple, automatic, even orchestrated manner. How far can automatisation go ? To what extend can automatisation be smart ?